Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-28064

CVE-2023-28064: Dell Alienware M15 R6 DOS Vulnerability

CVE-2023-28064 is a denial of service flaw in Dell Alienware M15 R6 Firmware caused by an out-of-bounds write in the BIOS. This article covers the technical details, affected versions, security impact, and mitigation.

Published: January 28, 2026

CVE-2023-28064 Overview

Dell BIOS contains an Out-of-bounds Write vulnerability (CWE-787) that affects a wide range of Dell client systems including laptops, desktops, and workstations. An unauthenticated attacker with physical access to the affected device may potentially exploit this vulnerability, leading to denial of service conditions.

Critical Impact

Physical attackers can trigger system instability and denial of service by exploiting memory corruption in the BIOS, potentially rendering affected Dell systems inoperable until BIOS recovery or replacement.

Affected Products

  • Dell Alienware M15 R6/R7 (Gaming Laptops)
  • Dell Inspiron Series (3511, 3520, 5310, 5320, 5410, 5420, 5620, 7420, 7510, 7610, and various 14/15/16-inch models)
  • Dell Latitude Series (3120, 3320, 3330, 3420, 3430, 3520, 3530, 5320, 5330, 5520, 5530, 5531, 7330, 7430, 7530, Rugged 5430, Rugged 7330)
  • Dell OptiPlex Series (3000, 5000, 5400, 7000, 7000 OEM, 7400, 7410 All-in-One)
  • Dell Precision Workstations (3560, 3570, 3571, 5760, 5770)
  • Dell Vostro Series (3420, 3510, 3520, 3910, 5310, 5320, 5410, 5510, 5620, 7510, 7620)
  • Dell XPS Series (13 9315 2-in-1, 17 9710, 17 9720)
  • Dell G15 Gaming (5510, 5511, 5520)
  • Dell Chengming (3900, 3901)

Discovery Timeline

  • June 23, 2023 - CVE-2023-28064 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2023-28064

Vulnerability Analysis

This vulnerability represents an out-of-bounds write condition in Dell BIOS firmware, classified under CWE-787 (Out-of-bounds Write). The flaw exists within the BIOS code responsible for handling certain memory operations during system initialization or runtime BIOS functions.

Out-of-bounds write vulnerabilities occur when software writes data past the end or before the beginning of an intended buffer. In the context of BIOS firmware, such vulnerabilities are particularly concerning because BIOS operates at the highest privilege level (Ring -2/Ring -1 in the platform security model) and has direct access to hardware resources.

When successfully exploited, this vulnerability enables an attacker to corrupt BIOS memory regions, potentially causing system crashes, boot failures, or persistent denial of service conditions. The physical access requirement significantly limits the attack surface, but in scenarios such as supply chain attacks, insider threats, or physical theft of devices, this vulnerability could be leveraged to disable enterprise systems.

Root Cause

The root cause of this vulnerability lies in improper bounds checking within the Dell BIOS code when processing certain inputs or data structures. The BIOS fails to adequately validate buffer boundaries before performing write operations, allowing data to be written outside the allocated memory region.

This type of vulnerability typically arises from:

  • Missing or insufficient length validation before memory copy operations
  • Incorrect calculation of buffer sizes during dynamic memory allocation
  • Failure to account for edge cases in data parsing routines within UEFI/BIOS modules

Attack Vector

The vulnerability requires physical access to the target system for exploitation. An attacker must be able to interact directly with the hardware, potentially through:

  • Direct manipulation of the system during boot process
  • Accessing BIOS/UEFI setup interfaces
  • Exploiting BIOS update mechanisms through physical interface access
  • Leveraging removable media or peripheral devices during system initialization

The attacker does not require prior authentication or user interaction to exploit this vulnerability. Once physical access is obtained, the exploitation does not require elevated privileges on the operating system level, as the attack occurs at the firmware layer before the OS loads.

The exploitation could involve crafting malicious input that triggers the out-of-bounds write condition, corrupting critical BIOS data structures and causing the system to become unbootable or unstable.

Detection Methods for CVE-2023-28064

Indicators of Compromise

  • Unexpected system crashes or failures during POST (Power-On Self-Test) sequences
  • BIOS corruption indicators such as failed boot attempts or checksum errors
  • Evidence of unauthorized physical access to systems (tampered chassis, broken security seals)
  • Anomalous firmware version mismatches across fleet devices

Detection Strategies

  • Implement hardware-based firmware integrity monitoring solutions to detect unauthorized BIOS modifications
  • Utilize Dell BIOS verification tools and Trusted Platform Module (TPM) measurements to validate firmware authenticity
  • Deploy endpoint detection solutions capable of monitoring pre-boot environment changes
  • Conduct regular firmware audits comparing installed BIOS versions against the known-good baseline

Monitoring Recommendations

  • Enable Secure Boot and maintain strict control over trusted keys to prevent unauthorized firmware execution
  • Monitor physical security controls and access logs for devices in shared or public locations
  • Configure BIOS administrative passwords and enable chassis intrusion detection where available
  • Integrate firmware health telemetry with SIEM solutions to detect anomalous boot patterns across the enterprise

How to Mitigate CVE-2023-28064

Immediate Actions Required

  • Identify all affected Dell systems in your environment using the affected product list from Dell Security Advisory DSA-2023-174
  • Prioritize BIOS updates for systems with elevated physical access risk (public kiosks, shared workstations, portable devices)
  • Implement enhanced physical security controls for vulnerable systems pending firmware updates
  • Configure BIOS administrator passwords to restrict unauthorized configuration changes

Patch Information

Dell has released BIOS security updates to address this vulnerability. Administrators should download and apply the latest BIOS firmware from the Dell Security Advisory DSA-2023-174 or directly from Dell Support drivers and downloads for their specific model.

BIOS updates can be deployed using:

  • Dell Command Update for individual systems
  • Dell Command Configure for scripted deployments
  • Dell BIOS Connect for network-based recovery
  • Manual BIOS flash via bootable USB media

Organizations should test BIOS updates in a controlled environment before broad deployment to ensure compatibility with existing configurations.

Workarounds

  • Implement strict physical access controls including locked server rooms, cable locks for laptops, and chassis intrusion detection
  • Enable BIOS-level passwords to prevent unauthorized access to firmware settings and boot configuration
  • Configure Secure Boot to maintain firmware integrity validation during the boot process
  • Consider BitLocker or similar full-disk encryption with TPM binding to detect unauthorized firmware changes
bash
# Example: Dell Command Update CLI for BIOS update
# Check current BIOS version
dcu-cli.exe /version

# Scan for available BIOS updates
dcu-cli.exe /scan -report="C:\Reports"

# Apply BIOS updates (requires reboot)
dcu-cli.exe /applyUpdates -reboot=enable -autoSuspendBitLocker=enable

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechDell

  • SeverityMEDIUM

  • CVSS Score4.6

  • EPSS Probability0.09%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-787
  • Vendor Resources
  • Dell Security Advisory DSA-2023-174
  • Related CVEs
  • CVE-2026-24509: Dell Alienware Command Center DoS Flaw

  • CVE-2026-22760: Dell Device Management Agent DoS Flaw

  • CVE-2023-28071: Dell Alienware Update DOS Vulnerability

  • CVE-2026-23853: Dell PowerProtect Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English